WO2014008871A1 - Method, apparatus, and device for touch screen verification - Google Patents

Method, apparatus, and device for touch screen verification Download PDF

Info

Publication number
WO2014008871A1
WO2014008871A1 PCT/CN2013/079302 CN2013079302W WO2014008871A1 WO 2014008871 A1 WO2014008871 A1 WO 2014008871A1 CN 2013079302 W CN2013079302 W CN 2013079302W WO 2014008871 A1 WO2014008871 A1 WO 2014008871A1
Authority
WO
WIPO (PCT)
Prior art keywords
trajectories
icons
inputted
user
touch
Prior art date
Application number
PCT/CN2013/079302
Other languages
English (en)
French (fr)
Inventor
Lei Qin
Hong Zhang
Yunyun HAO
Original Assignee
Tencent Technology (Shenzhen) Company Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology (Shenzhen) Company Limited filed Critical Tencent Technology (Shenzhen) Company Limited
Publication of WO2014008871A1 publication Critical patent/WO2014008871A1/en
Priority to PH12014501915A priority Critical patent/PH12014501915A1/en
Priority to US14/591,069 priority patent/US20150123925A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/041Indexing scheme relating to G06F3/041 - G06F3/045
    • G06F2203/04106Multi-sensing digitiser, i.e. digitiser using at least two different sensing technologies simultaneously or alternatively, e.g. for detecting pen and finger, for saving power or for improving position detection

Definitions

  • Electronic devices having touch screens e.g., mobile phones, personal digital assistants (PDAs), etc.
  • PDAs personal digital assistants
  • the screen lock function may prevent false operations when a device is not intended to be used (e.g., a false phone-dialing or a false launching of application programs), or prevent other people from viewing information on the device when the device is not in hands of the device owner.
  • One method includes using a slide -to -unlock function to unlock the device. That is, according to a prompt for sliding on the device, a user may slide along a fixed trajectory direction to complete an unlock verification of the device.
  • Such an unlock verification method is mainly intended for preventing false operations by the user, and cannot provide security protection on user information.
  • the other method includes inputting a password for an unlock verification. Such method may greatly improve device security. However, given the limited size of the touch screen, it is challenging to input a password. When inputting the password with a nine-button keyboard, the user needs to select needed characters among multiple characters. This provides a complicated password inputting and affects the inputting speed. In some cases, a full keyboard may be used by the user to input the needed characters. However, due to the limited size of the touch screen, the password inputting may be prone to errors.
  • a device verification method In this method, trajectories of at least two discrete touch gestures inputted by a user can be recorded by an electronic device. The recorded trajectories of the at least two discrete touch gestures can be compared by the electronic device with trajectories in a preset sequence of trajectories. A successful verification can be determined by the electronic device, when the trajectories of the inputted at least two discrete touch gestures are consistent with the trajectories in the preset sequence of trajectories.
  • a device verification method having a plurality of icons (also referred to as "visible-icons") on a touch screen of an electronic device. Trajectories of at least two discrete touch gestures inputted by a user for connecting icons can be recorded and compared with trajectories in a preset sequence of trajectories. A successful verification can be determined when the trajectories of the inputted discrete touch gestures are consistent with trajectories in the preset sequence of trajectories.
  • a device verification apparatus having a plurality of icons on a touch screen of an electronic device.
  • the device verification apparatus can include, e.g., a recording module, a comparing module, and a sending module.
  • the recording module can be configured to record trajectories of at least two discrete touch gestures inputted by a user for connecting icons.
  • the comparing module can be configured to compare the recorded trajectories of the discrete touch gestures for connecting icons with trajectories in a preset sequence of trajectories.
  • the sending module can be configured to determine and send a successful verification to a system of the electronic device, when the trajectories of the inputted discrete touch gestures are consistent with the trajectories in the preset sequence of trajectories.
  • a user can input multiple touch gestures, which can form many different sequences of trajectories for device verification (also referred to as touch screen verification) via various permutations and combinations. Therefore, compared with existing slide -to-unlock technology, device security can be improved. Further, compared with existing methods for inputting passwords, device verification by multiple sliding gestures according to various disclosed embodiments can be conveniently operated and less prone to errors.
  • FIG. 1 depicts a flow diagram of an exemplary method for device verification in accordance with various disclosed embodiments
  • FIG. 2 depicts a schematic of an exemplary display interface for device verification in accordance with various disclosed embodiments
  • FIG. 3 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments
  • FIG. 4 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments
  • FIG. 5 depicts a schematic of another exemplary display interface for device verification in accordance with various disclosed embodiments
  • FIG. 6 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments
  • FIG. 7 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments.
  • FIG. 8 depicts a schematic of another exemplary display interface for device verification in accordance with various disclosed embodiments
  • FIG. 9 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments.
  • FIG. 10 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments;
  • FIG. 1 1 depicts a structural schematic of an exemplary apparatus for device verification in accordance with various disclosed embodiments.
  • FIG. 12 depicts a schematic of another exemplary display interface for device verification in accordance with various disclosed embodiments.
  • a password for device verification can be formed by setting a combination of multiple sliding gestures or other touch gestures. Security requirements of device verification can be achieved. A user can simply complete a verification operation by the sliding gestures with no errors easily occurring.
  • FIG. 1 depicts a flow diagram of an exemplary method for device verification in accordance with various disclosed embodiments.
  • Step S101 trajectories of at least two (i.e., multiple) discrete touch gestures inputted by a user are recorded.
  • Electronic devices having a touch screen may include, for example, mobile phones, tablet computers, or other suitable devices with touch input.
  • the term device can include an electronic device.
  • a touch screen can be a liquid crystal display device capable of receiving inputted signals. When a pattern or an image on the screen is touched by a user, a touch feedback system on the screen can send feedback to the user according to a pre -programed software/program.
  • a typical touch screen gesture operation includes the following.
  • the touch screen system locates and verifies information inputted according to a pattern/icon or position touched by the finger or other suitable object.
  • the touch screen may often include a touch detection apparatus and a touch screen controller.
  • the touch detection apparatus can be installed in front of the screen, and can be used to detect and receive the position information touched by the user and send the position information to the touch screen controller.
  • the touch screen controller can receive the information sent from the touch detection apparatus, transform the information into coordinates of point(s), and send the coordinates of point(s) to, for example, a central processing unit (CPU).
  • CPU central processing unit
  • the touch screen controller can also receive commands from the CPU to display on the screen.
  • the term screen in this disclosure may be referred to as a touch screen.
  • the recorded multiple discrete touch gestures inputted by the user can be arbitrarily inputted by the user, including for example a screen diagonal line, a horizontal midline, a vertical midline, etc.
  • the touch gestures can be correspondingly inputted according to a verification sequence preset by the user.
  • a trajectory of the touch gesture can be recorded using a plurality of coordinate points of the touch gesture inputted by the user.
  • requirements for inputting the gestures may be relatively strict.
  • a trajectory can be preset to include about two or three coordinate points. When a touch gesture inputted by the user reaches these two or three coordinate points, the trajectory corresponding to these coordinate points can be triggered.
  • a time interval can be defined between inputted gestures for each gesture.
  • the time interval between every two consecutive touch gestures can be preset to be about 1 second or any other suitable time length.
  • the trajectory of the touch gesture inputted by the user can be received.
  • the time interval is greater than about 1 second (i.e., exceeds the preset time interval)
  • the inputted sequence of trajectories can be considered as completed. The method can then proceed to perform Step SI 02.
  • Step SI 02 the recorded trajectories of the multiple touch gestures are compared with trajectories in a preset sequence of trajectories.
  • Step SI 01 For example, by repeatedly performing Step SI 01 for a certain number of times, a sequence of trajectories of the multiple touch gestures inputted by the user can be obtained.
  • the sequence of trajectories of the inputted touch gestures can be compared with the preset sequence of trajectories according to the sequential order of the inputting.
  • the security of verification can be improved, and the possibility of cracking the password of the device can be reduced.
  • the preset sequence of trajectories can be set by the user as desired, e.g., according to personal habits and/or hobbies.
  • positions, directions, and/or the number of touch gestures/trajectories can be preset.
  • the number of touch gestures/trajectories should not be too low.
  • the number of touch gestures/trajectories should not be too high, because too many touch gestures/trajectories can cause troublesome inputting.
  • Step S103 if the trajectories of the inputted discrete touch gestures are the same as or otherwise consistent with trajectories in the preset sequence of trajectories, the verification is successful.
  • the trajectories of the multiple touch gestures obtained in Step SI 01 can be compared with trajectories in the preset sequence of trajectories as depicted in Step S102. If they are the same or otherwise consistent with each other, the user is indicated legal and the verification is successful. The user is therefore allowed to access and operate the electronic device.
  • the comparison between the two sequences of trajectories can be configured as needed.
  • one or more coordinate points can be set to compare trajectories of touch gestures.
  • a trajectory can be denoted by setting multiple (such as two or three) coordinate points.
  • the sliding direction of the finger for each trajectory is not limited.
  • the finger can slide on the touch screen from top to bottom or from bottom to top, although an arrow is shown in FIG. 2 for the upward sliding gesture 1.
  • FIG. 2 further includes exemplary touch gestures of a rightward horizontal sliding gesture 2 from the middle left, and a downward sliding gesture 3 from the middle top.
  • the system of the electronic device can receive touch gestures inputted by the user. If an illegal user does not know the preset touch gestures/trajectories, it can be difficult to obtain the device verification by repeatedly attempting to slide.
  • multiple inputted gestures can be used to unlock a password for device verification. Due to diversity of combinations of gestures, the security of device verification can be ensured. In addition, sliding gestures can be used for the device verification, which is convenient for user to operate.
  • Step S301 a sequence of trajectories is preset for comparison.
  • a user may need to verify inputted touch gestures. Therefore, for user's convenience to preset the sequence of trajectories, after entering a mode of setting the sequence of trajectories of the touch gestures for comparison, the sequence of trajectories can be preset by first sequentially inputting the touch gestures for comparison on a touch screen of a device to form the sequence of trajectories used for a subsequent comparison.
  • the formed sequence of trajectories can be directly stored. Alternatively, the sequence of trajectories can be repeatedly formed (e.g., once again) by sequentially inputting the touch gestures for a second time. Such sequence of trajectories can then be stored after a comparison that confirms the sequences of trajectories inputted in both (or repeated) times are consistent or the same.
  • a reproduction of the touch gesture can be shown on the screen, in order to ensure that the user can effectively memorize and confirm the touch gesture.
  • the group of sequences of touch gestures can be directly used as the sequence of trajectories formed by the touch gestures for a subsequent comparison.
  • the user may need to re-input these touch gestures, according to the order, the positions, and the directions of the previous inputting, to enhance the user's impression and to avoid setting a false password by the touch gestures.
  • the trajectory information of the touch gestures recorded by the system of the electrical device can be a series of coordinate values.
  • each touch gesture can be defined in the form of, e.g., two coordinate points or other suitable number of coordinate points.
  • Step S302 trajectories of at least two (i.e., multiple) discrete touch gestures inputted by a user are recorded.
  • Step S303 the recorded trajectories of the multiple touch gestures are compared with trajectories in the preset sequence of trajectories.
  • Step S304 if the trajectories of the inputted discrete touch gestures are the same as or otherwise consistent with trajectories in the preset sequence of trajectories, the verification is determined successful.
  • Steps S302-S304 can be the same as or similar to Steps SI 01 -SI 03 as described above in accordance with various disclosed embodiments.
  • Step S305 if the trajectories of the inputted discrete touch gestures are not the same as or not consistent with trajectories in the preset sequence of trajectories, a verification failure message can be prompted.
  • the sequence of trajectories of the touch gestures for comparison can be preset by the user, which can thus reflect the user's personal habits and personality. This provides flexibility and convenience to the users.
  • FIG. 4 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments.
  • a touch screen of a device can be provided with one or more visible-icons on the touch screen.
  • the number of icons can be determined based on the convenience for users to operate. If there are too many visible-icons, a user may be affected during verification, which can cause false operations and affect verification efficiency. On the other hand, there should not be too few visible-icons. For example, if two icons are set, connections may be repeatedly made between the two icons, which may easily confuse the operator or cause difficulty in memorizing.
  • Step S401 trajectories of at least two (i.e., multiple) discrete touch gestures inputted by a user for connecting icons on a touch screen are recorded.
  • the user can determine the direction and position of sliding according to the icons.
  • the user can connect any two of the four icons as a touch gesture.
  • about three touch gestures can be set in sequences for verification.
  • a first touch gesture 1 can slide from a lower right comer to an upper left comer
  • a second touch gesture 2 can slide from the lower left comer to the lower right corner
  • a third touch gesture 3 can slide from the lower left comer to the upper right comer.
  • Step S402 the recorded trajectories of the multiple touch gestures are compared with trajectories in a preset sequence of trajectories.
  • the comparison with the preset sequence of trajectories can be based on the recorded order of passing the icons by the touch gestures and/or the recorded number of touch gestures. Because the icons can be expressed as coordinates, during the comparison, only the sequence of coordinates and the number of touch gestures need to be compared. Only when corresponding sequences of coordinates and/or corresponding number of touch gestures are completely overlapped, the comparison can be considered in consistent with each other. In some cases when a verification method is limited by an inputting order, the number of times for triggering the corresponding coordinates and the number of touch gestures can be sufficient for the comparison.
  • Step S403 if the trajectories of the inputted discrete touch gestures are the same as or otherwise consistent with the trajectories in the preset sequence of trajectories, the verification is successful.
  • the system can perform corresponding functions or rights permitted by the verification.
  • operations on the mobile phone including, e.g., dialing a phone number and accessing the Internet can be performed.
  • references can be made or added by the icons when the touch gestures are inputted. This can improve the convenience to the users during the inputting of touch gestures, especially when the flexibility of inputting touch gestures is limited.
  • FIG. 6 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments.
  • a sequence of trajectories is preset for comparison.
  • the presetting of the sequence of trajectories for comparison can include, for example, (1) defining a trajectory for connecting icons; (2) selectively inputting the defined trajectory for connecting icons on certain orders to form a sequence of trajectories; (3) directly storing the sequence of trajectories, or storing the sequence of trajectories after a repeatedly inputting and a repeatedly comparison that confirms the sequences of trajectories inputted in both or the repeated times are consistent with each other.
  • the defining of the trajectory for connecting icons can be demonstrated in the example shown in FIG. 5. Based on the four icons on the screen, about 12 touch gestures can be defined between two icons. Among those 12 touch gestures, a same trajectory (e.g., for connecting the same two icons) having a different direction can represent a different gesture.
  • Step S602 trajectories of at least two (i.e., multiple) discrete touch gestures inputted by a user for connecting icons are recorded.
  • Step S603 the recorded trajectories of the multiple touch gestures are compared with trajectories in a preset sequence of trajectories.
  • Step S604 if the trajectories of the inputted discrete touch gestures are the same as or otherwise consistent with the trajectories in the preset sequence of trajectories, the verification is successful.
  • Steps S602-S604 can be the same as or similar to Steps S401-S403 as disclosed above in accordance with various embodiments.
  • the user can use a defined connection method between icons to input corresponding touch gestures. Such defining is convenient, and can provide the user with good visual guide.
  • FIG. 7 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments.
  • visible-icons provided with a touch screen of a device can include a start icon and multiple end icons. Further, on each one of the end icons, there can be a corresponding letter, number and/or other character. For example, referring to FIG. 8, on the position of each end icon, there can be a corresponding number (1 , 2, 3, 4, 5, 6, 7, or 8) or a letter (a, b, c, d, e, f, g, or h). There can be eight methods for connections from the start icon to the end icons. A user can set the permutation and combination of the eight connecting methods.
  • Step S701 a touch gesture from the start icon to an end icon inputted by a user is detected.
  • Step S702 a trajectory of the touch gesture from the start icon to an end icon inputted by the user is recorded.
  • a trajectory of a next sliding touch gesture can be detected within a predetermined time interval. When the predetermined time interval is exceeded, the recording of the trajectory of the touch gesture can be completed.
  • Step S703 the recorded trajectories of multiple touch gestures are compared with trajectories in a preset sequence of trajectories.
  • Step S704 if the trajectories of the inputted discrete touch gestures are the same as or otherwise consistent with the trajectories in the preset sequence of trajectories, the verification is successful.
  • a touch gesture in the verification interface as shown in FIG. 8, can be form by connecting the large center start icon with one of the surrounding end icons.
  • the number of available touch gestures can be low. Combined with the symbols on the icons, it can be easier for the user to memorize and to use.
  • the verification through simple sliding (touch gestures) can ensure security requirements and can allow convenient operations.
  • a password preset by the user can be 4321.
  • four sliding touch gestures can be performed.
  • the first gesture can form a trajectory from the start icon to the number 4
  • the second gesture can form a trajectory from the start icon to the number 3, and so on, until the four trajectories are completed, and the verification can be successful.
  • the position of each number on the verification interface can be randomly generated each time. As long as the user remembers the password, the user can unlock the device according to the numbers displayed, but the gestures can be different every time.
  • FIG. 9 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments.
  • Step S901 a touch gesture inputted by a user from starting touching the first icon to leaving a last-touched icon is detected.
  • Step S902 a trajectory of the touch gesture inputted by the user from starting touching the first icon to leaving the last-touched icon is recorded.
  • a trajectory of a next sliding touch gesture can be detected within a predetermined time interval. When the predetermined time interval is exceeded, the recording of trajectory of the touch gesture can be completed.
  • touch gestures according to a sequence of trajectories can be formed by connecting more than two icons together, e.g., by connecting three or more icons. Therefore, under these circumstances, data (e.g., coordinates) need to be recorded for all passing points by a trajectory of a touch gesture inputted by a user from starting touching the first icon to leaving the last-touched icon.
  • data e.g., coordinates
  • Step S903 the recorded trajectories of at least two (i.e., multiple) discrete touch gestures are compared with trajectories in a preset sequence of trajectories.
  • a touch gesture inputted by the user each time is not limited by two icons.
  • a touch gesture can connect more than two, e.g., three or four or more icons.
  • FIG. 10 depicts a flow diagram of another exemplary method for device verification in accordance with various disclosed embodiments.
  • icons on a touch screen can have corresponding characters thereon.
  • Step S1001 characters are randomly assigned to the icons on a touch screen.
  • the characters on the icons can be randomly assigned.
  • an icon “1 " can be located on an upper middle position during a previous verification.
  • the icon "1 " may be in a position other than the upper middle position, e.g., in a lower middle position or other suitable positions.
  • Step SI 002 trajectories of at least two (i.e., multiple) discrete touch gestures inputted by a user for connecting icons are recorded.
  • the user may need to adjust directions and positions of the inputted gestures, according to positions where the characters are randomly assigned.
  • Step S1003 the recorded trajectories of the multiple touch gestures are compared with trajectories in a preset sequence of trajectories.
  • Step SI 004 if the trajectories of the inputted discrete touch gestures are the same as or otherwise consistent with the trajectories in the preset sequence of trajectories, the verification is successful.
  • This specific embodiment aims to further improve the security of device verification.
  • touch marks from verification may remain on the touch screen.
  • usual trajectories can be identified.
  • randomly-assigned characters can prevent such a situation, thus further improving device security.
  • FIG. 1 1 depicts a schematic of an exemplary apparatus for device verification in accordance with various disclosed embodiments.
  • a touch screen of a device is provided with multiple visible-icons.
  • the exemplary apparatus for device verification can include a recording module 1101 , a comparing module 1 102, a sending module 1 103 and/or an optional assigning module 1104.
  • the recording module 1101 is configured to record trajectories of at least two (i.e., multiple) discrete touch gestures inputted by a user for connecting icons.
  • the comparing module 1 102 is configured to compare the recorded trajectories of the multiple touch gestures with trajectories in a preset sequence of trajectories.
  • the sending module 1103 is configured to determine that the verification is successful if the trajectories of the inputted discrete touch gestures are the same as or otherwise consistent with the preset sequence of trajectories and then send the successful verification to the system of the device to unlock the device.
  • each module of the apparatus for device verification can be operated in a manner that is similar to or the same as corresponding step(s) in the method for device verification according to various disclosed embodiments, e.g., as depicted in FIGS. 1 , 3, 4, 6, 7, 9, and/or 10.
  • various disclosed embodiments also provide a device with a touch screen having the apparatus for device verification according to various disclosed embodiments.
  • trajectories of multiple discrete touch gestures can be set using familiar characters or patterns, which may allow an easy memorizing and/or operating during device verification.
  • trajectories of touch gestures can form a shape of letter "A", wherein the stroke order can be consistent with the order of trajectories of the touch gestures.
  • Trajectories set by familiar characters can be more convenient for users to memorize, thus improving operation efficiency.
  • users' names e.g., Chinese characters, such as a Chinese last name pronounced "ma”
  • the method depicted in FIG. 12 may also be referred to as a dual verification.
  • the user may also enjoy the experience to sign a name on a device (e.g., a mobile phone).
  • a combination of touch gestures can be used as a password for device verification.
  • Touch gestures can be used to replace traditional characters such as letters, which can ensure device security and convenient user operations at the same time.
  • Icons can be provided on a touch screen, thus providing users with visual guide. Characters can be correspondingly provided with the icons for ease to be memorized and operated.
  • characters can be randomly assigned onto icons, so device security can be better ensured by preventing illegal users from verifying the device by touch marks.
  • touch gestures can be used as a part or a whole of a password, e.g., to replace combinations of 0-9, a-z and/or symbols in conventional passwords. Complexity of passwords can thus be reduced, while user's experience can be greatly improved.
  • gestures used to form passwords are not limited to sliding gestures.
  • a variety of gestures can be used to form passwords according to the features of the devices. More types and larger number of gestures can be introduced according to the need of password complexity. In addition, one gesture with high complexity can also be used as a password.
  • the method of using a password of gestures can include the following three functions: (1) presetting a password; (2) verifying the password; and/or (3) changing the password.
  • a user needs to consecutively input an identical combination (i.e., sequence) of gestures at least twice.
  • the touch screen can transform the gestures into coordinates and send to the device system.
  • the device system can decide whether the twicely-inputted gestures are consistent with each other (e.g., with a certain margin of error allowed.). If they are consistent with each other, the password is successfully preset, and the sequence of gestures can be stored in the device system as a password with gestures.
  • the device system can display a gesture inputting interface on the screen.
  • the user can thus input a sequence of gestures on the screen in the same order as presetting the password.
  • the touch screen can transform the gestures into coordinates and send to the device system.
  • the system can decide whether the inputted gestures are consistent with the gestures of the preset password (e.g., with a certain margin of error allowed). If they are consistent with each other, the verification is successful and the user can proceed to the next operation, e.g., to make a phone call.
  • the changing of the password can include two steps. In a first step, the password can be verified to verify the user identity. In a second step, after a successful verification, a new password of gestures can be preset.
  • each module is logically divided according to function, but is not limited to such a division so long as each module can realize the corresponding function.
  • the specific name of each functional module is only intended for being distinguished from each other, and does not limit the scope of protection for the current disclosure.
  • one or more or all of the steps in each of the exemplary methods herein can be accomplished using a program/software to instruct related hardware.
  • Such program/software can be stored in a computer readable storage medium including, e.g., ROM/RAM, magnetic disk, optical disk, etc.
  • a user can input multiple touch gestures, which can form many different sequences of trajectories for device verification via various permutations and combinations. Therefore, compared with existing slide -to -unlock technology, device security can be improved. Further, compared with existing methods for inputting passwords, device verification by multiple sliding gestures according to various disclosed embodiments can be conveniently operated and less prone to errors.
  • Reference Sign List
PCT/CN2013/079302 2012-07-13 2013-07-12 Method, apparatus, and device for touch screen verification WO2014008871A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PH12014501915A PH12014501915A1 (en) 2012-07-13 2014-08-26 Method, apparatus, and device for touch screen verification
US14/591,069 US20150123925A1 (en) 2012-07-13 2015-01-07 Method, apparatus, and device for touch screen verification

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210243186.4A CN103544426A (zh) 2012-07-13 2012-07-13 一种触摸屏认证方法、装置及设备
CN201210243186.4 2012-07-13

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/591,069 Continuation US20150123925A1 (en) 2012-07-13 2015-01-07 Method, apparatus, and device for touch screen verification

Publications (1)

Publication Number Publication Date
WO2014008871A1 true WO2014008871A1 (en) 2014-01-16

Family

ID=49915421

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/079302 WO2014008871A1 (en) 2012-07-13 2013-07-12 Method, apparatus, and device for touch screen verification

Country Status (4)

Country Link
US (1) US20150123925A1 (zh)
CN (1) CN103544426A (zh)
PH (1) PH12014501915A1 (zh)
WO (1) WO2014008871A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104090723A (zh) * 2014-07-22 2014-10-08 Tcl通讯(宁波)有限公司 一种基于触摸屏触摸面积的解锁方法及系统
CN104331648A (zh) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 应用的加锁系统、加锁方法、解锁系统及解锁方法
CN104714752A (zh) * 2015-03-27 2015-06-17 惠州Tcl移动通信有限公司 一种基于移动终端的触摸屏解锁方法及系统
CN105786375A (zh) * 2014-12-25 2016-07-20 阿里巴巴集团控股有限公司 在移动终端操作表单的方法及装置
JP2018536216A (ja) * 2015-10-01 2018-12-06 クアルコム,インコーポレイテッド コンピューティングデバイス上でコードを入力するための技法
CN114201079A (zh) * 2021-12-06 2022-03-18 苏州长风航空电子有限公司 红外触摸屏的可靠性验证方法和验证系统

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929536B (zh) * 2012-10-11 2016-03-16 百度在线网络技术(北京)有限公司 移动终端的解锁及验证方法与解锁及验证装置
KR101556599B1 (ko) * 2013-10-30 2015-10-02 연세대학교 산학협력단 패턴 입력 장치 및 방법과 이를 이용한 기록 매체
US11435895B2 (en) * 2013-12-28 2022-09-06 Trading Technologies International, Inc. Methods and apparatus to enable a trading device to accept a user input
CN104808933B (zh) * 2014-01-24 2019-03-15 腾讯科技(北京)有限公司 智能终端的解锁控制方法和装置
CN103971046B (zh) * 2014-03-31 2018-10-19 小米科技有限责任公司 一种解密的方法和装置
US9645731B2 (en) 2014-03-31 2017-05-09 Xiaomi Inc. Unlocking method and device using same
CN105095738B (zh) * 2014-04-25 2019-01-08 阿里巴巴集团控股有限公司 一种防偷窥的密码输入方法和设备
CN104200147A (zh) * 2014-09-04 2014-12-10 王洋 基于触屏设备的身份认证方法和系统及安全隐私加密方法
CN105574396A (zh) * 2014-10-14 2016-05-11 深圳富泰宏精密工业有限公司 电子设备解锁系统及方法
FR3033203B1 (fr) 2015-02-27 2018-03-23 Quickstep Technologies Llc Procede pour interagir avec un appareil electronique et/ou informatique mettant en œuvre une surface de commande capacitive et une surface peripherique, interface et appareil mettant en œuvre ce procede
CN104867007A (zh) * 2015-03-31 2015-08-26 太仓云联信息科技有限公司 一种联动式快捷支付系统
CN104951693A (zh) * 2015-06-12 2015-09-30 惠州Tcl移动通信有限公司 一种基于移动终端的密码输入检测方法及系统
CN105095730A (zh) * 2015-06-25 2015-11-25 中兴通讯股份有限公司 控制电子设备/解锁手持终端的方法、装置及电子设备
CN104965657B (zh) * 2015-06-30 2019-03-08 Oppo广东移动通信有限公司 触摸控制方法及装置
CN105138258B (zh) * 2015-07-22 2019-07-05 上海斐讯数据通信技术有限公司 一种移动终端屏幕锁屏的解锁方法及解锁装置
CN105204682A (zh) * 2015-08-27 2015-12-30 上海斐讯数据通信技术有限公司 一种办公设备的控制方法及控制系统
CN105069347B (zh) * 2015-08-27 2017-11-24 广东欧珀移动通信有限公司 一种解锁的方法及终端
CN105740691A (zh) * 2016-01-27 2016-07-06 深圳市金立通信设备有限公司 一种密码验证方法和终端
CN105809018A (zh) * 2016-03-11 2016-07-27 深圳市金立通信设备有限公司 一种滑动轨迹验证方法及终端
CN106055964A (zh) * 2016-07-11 2016-10-26 深圳天珑无线科技有限公司 智能移动终端及其解锁方式
CN106778217A (zh) * 2016-11-29 2017-05-31 维沃移动通信有限公司 一种移动终端解锁错误处理方法及移动终端
CN106815498B (zh) * 2017-01-09 2021-05-28 惠州Tcl移动通信有限公司 一种基于移动终端的滑动解锁检测处理方法及系统
US10417410B2 (en) * 2017-03-27 2019-09-17 International Business Machines Corporation Access control to protected resource based on images at changing locations identifiable by their type
CN110188527A (zh) * 2018-02-23 2019-08-30 和硕联合科技股份有限公司 解锁方法及电子装置
CN109117045B (zh) * 2018-08-27 2021-08-10 Tcl移动通信科技(宁波)有限公司 触摸屏的操作检测方法、移动终端及存储介质
CN113688373A (zh) * 2020-05-19 2021-11-23 中移(成都)信息通信科技有限公司 滑动解锁方法、装置、设备和介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0690368A2 (en) * 1994-06-29 1996-01-03 International Business Machines Corporation A pen-based computer system
US7159139B2 (en) * 1999-08-20 2007-01-02 Emc Corporation Digital data storage subsystem including directory for efficiently providing formatting information for stopped records and utilization of a check value for verifying that a record is from a particular storage location

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11149454A (ja) * 1997-09-10 1999-06-02 Fujitsu Ltd 認証装置、ユーザ認証方法、ユーザ認証用カード及び記憶媒体
KR100306277B1 (ko) * 1998-05-29 2001-11-02 윤종용 문자인식디지털휴대용전화기에서비밀기호등록및확인방법
FI20021655A (fi) * 2002-06-19 2003-12-20 Nokia Corp Menetelmä lukituksen avaamiseksi ja kannettava elektroninen laite
TWI227838B (en) * 2003-07-30 2005-02-11 Fujitsu Ltd Certifying method, certifying device, and computer readable storing medium
WO2007046466A1 (ja) * 2005-10-21 2007-04-26 Sanyo Electric Co., Ltd. 暗証番号等を入力する為の入力装置およびその入力装置を備えた携帯電話装置
CN101464741B (zh) * 2007-12-19 2011-12-07 联想(北京)有限公司 触摸板、触摸板使用方法以及具有触摸板的笔记本电脑
JP5238297B2 (ja) * 2008-03-04 2013-07-17 シャープ株式会社 認証方法および入力装置
US20100031200A1 (en) * 2008-07-30 2010-02-04 Arima Communications Corp. Method of inputting a hand-drawn pattern password
CN101339489A (zh) * 2008-08-14 2009-01-07 炬才微电子(深圳)有限公司 人机交互方法、装置和系统
US20110260829A1 (en) * 2010-04-21 2011-10-27 Research In Motion Limited Method of providing security on a portable electronic device having a touch-sensitive display
US8402533B2 (en) * 2010-08-06 2013-03-19 Google Inc. Input to locked computing device
CN102253803B (zh) * 2011-07-06 2013-09-11 汉王科技股份有限公司 一种触摸屏的解锁方法及装置
CN102368200A (zh) * 2011-10-28 2012-03-07 青岛海信移动通信技术股份有限公司 一种触摸屏解锁方法及具有触摸屏的电子产品

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0690368A2 (en) * 1994-06-29 1996-01-03 International Business Machines Corporation A pen-based computer system
US7159139B2 (en) * 1999-08-20 2007-01-02 Emc Corporation Digital data storage subsystem including directory for efficiently providing formatting information for stopped records and utilization of a check value for verifying that a record is from a particular storage location

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104090723B (zh) * 2014-07-22 2017-09-05 Tcl通讯(宁波)有限公司 一种基于触摸屏触摸面积的解锁方法及系统
CN104090723A (zh) * 2014-07-22 2014-10-08 Tcl通讯(宁波)有限公司 一种基于触摸屏触摸面积的解锁方法及系统
CN104331648A (zh) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 应用的加锁系统、加锁方法、解锁系统及解锁方法
EP3239828A4 (en) * 2014-12-25 2017-12-20 Alibaba Group Holding Limited Method and device for operating form on mobile terminal
CN105786375A (zh) * 2014-12-25 2016-07-20 阿里巴巴集团控股有限公司 在移动终端操作表单的方法及装置
KR20170108963A (ko) * 2014-12-25 2017-09-27 알리바바 그룹 홀딩 리미티드 모바일 단말 상에서 폼 조작 방법 및 장치
US10452261B2 (en) 2014-12-25 2019-10-22 Alibaba Group Holding Limited Methods and apparatuses for form operation on a mobile terminal
US10732832B2 (en) 2014-12-25 2020-08-04 Alibaba Group Holding Limited Methods and apparatuses for form operation on a mobile terminal
KR102183084B1 (ko) * 2014-12-25 2020-11-26 알리바바 그룹 홀딩 리미티드 모바일 단말 상에서 폼 조작 방법 및 장치
US11099732B2 (en) 2014-12-25 2021-08-24 Advanced New Technologies Co., Ltd. Methods and apparatuses for form operation on a mobile terminal
CN104714752A (zh) * 2015-03-27 2015-06-17 惠州Tcl移动通信有限公司 一种基于移动终端的触摸屏解锁方法及系统
JP2018536216A (ja) * 2015-10-01 2018-12-06 クアルコム,インコーポレイテッド コンピューティングデバイス上でコードを入力するための技法
CN114201079A (zh) * 2021-12-06 2022-03-18 苏州长风航空电子有限公司 红外触摸屏的可靠性验证方法和验证系统
CN114201079B (zh) * 2021-12-06 2023-09-22 苏州长风航空电子有限公司 红外触摸屏的可靠性验证方法和验证系统

Also Published As

Publication number Publication date
US20150123925A1 (en) 2015-05-07
PH12014501915A1 (en) 2014-11-24
CN103544426A (zh) 2014-01-29

Similar Documents

Publication Publication Date Title
WO2014008871A1 (en) Method, apparatus, and device for touch screen verification
KR101175042B1 (ko) 사용자 단말기의 패스워드 인증 방법 및 그 장치
US10176315B2 (en) Graphical authentication
CN105723379B (zh) 促进安全屏幕输入的方法和装置
US9507928B2 (en) Preventing the discovery of access codes
EP2763070B1 (en) Graphical user interface (GUI) that receives directional input to change face for receiving passcode
US20090307768A1 (en) Password input system and method
US20120110663A1 (en) Apparatus and method for inputting user password
US10732823B2 (en) User interface and method for the protected input of characters
US10885164B2 (en) Login process for mobile phones, tablets and other types of touch screen devices or computers
KR101201934B1 (ko) 가변 패스워드를 이용한 사용자 단말기의 패스워드 인증 방법 및 그 장치
CN106709382B (zh) 一种键盘显示方法及装置
EP2977879A1 (en) Mobile terminal-based method and system for unlocking screen, and storage medium
US9030293B1 (en) Secure passcode entry
JP2016009340A (ja) 情報処理装置、同装置におけるロック中画面の表示制御方法及び表示制御プログラム
CN106407761B (zh) 一种解锁方法及解锁装置
CN105824554B (zh) 一种移动终端的解锁方法和装置
KR101290850B1 (ko) 스크롤 휠을 이용한 사용자 단말기의 패스워드 인증 방법 및 그 장치
US11630575B2 (en) System and method for a keypad on a touch screen device
JP2014228997A (ja) 携帯端末装置及びその認証方法
AU2013101012A4 (en) A Login Process for Mobile Phones, Tablets and Other Types of Touch Screen Devices or Computers
WO2010098383A1 (ja) 認証装置、認証方法及びそれをコンピュータに実行させるプログラム
WO2017107340A1 (zh) 输入方法、装置及终端
KR102325833B1 (ko) 그래픽 오티피를 이용한 사용자 인증방법 및 인증시스템
KR101823057B1 (ko) 계층화된 패턴을 이용한 인증 방법 및 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13817275

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 12014501915

Country of ref document: PH

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 24.6.2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13817275

Country of ref document: EP

Kind code of ref document: A1